Achieving Privacy and Security using QR Code by means of Encryption Technique in ATM

被引:3
|
作者
Malathi, V. [1 ]
Balamurugan, B. [2 ]
Eshwar, S. [3 ]
机构
[1] RGM Coll Engn & Technol, Nandyal, India
[2] VIT Univ, Vellore, Tamil Nadu, India
[3] HTC Global Serv Pvt Ltd, Hyderabad, Andhra Pradesh, India
关键词
QR Code; DES Algorithm; Peeping Attack; AUTHENTICATION; EFFICIENT;
D O I
10.1109/ICRTCCM.2017.36
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart Card has complications with validation and transmission process. Therefore, by using peeping attack, the secret code was stolen and secret filming while entering Personal Identification Number at the ATM machine. We intend to develop an authentication system to banks that protects the asset of user's. The data of a user is to be ensured that secure and isolated from the data leakage and other attacks Therefore, we propose a system, where ATM machine will have a QR code in which the information's are encrypted corresponding to the ATM machine and a mobile application in the customer's mobile which will decrypt the encoded QR information and sends the information to the server and user's details are displayed in the ATM machine and transaction can be done. Now, the user securely enters information to transfer money without risk of peeping attack in Automated Teller Machine by just scanning the QR code at the ATM by mobile application. Here, both the encryption and decryption technique are carried out by using Triple DES Algorithm (Data Encryption Standard).
引用
收藏
页码:281 / 285
页数:5
相关论文
共 50 条
  • [41] Preserving Privacy of Drone Videos using Proxy Re-encryption Technique
    Baboolal, Vashish
    Akkaya, Kemal
    Saputro, Nico
    Rabieh, Khaled
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 336 - 337
  • [42] Privacy preserving security using multi-key homomorphic encryption for face recognition
    Wang, Jing
    Xin, Rundong
    Alfarraj, Osama
    Tolba, Amr
    Tang, Qitao
    EXPERT SYSTEMS, 2025, 42 (02)
  • [43] Technical Concepts on Cloud Security and Privacy Using Deep Learning Techniques and Hybridized Encryption
    Rajchandar, K.
    Madanan, Mukesh
    Sastry, R. V. L. S. N.
    Saxena, Monika
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON DATA SCIENCE, MACHINE LEARNING AND APPLICATIONS, VOL 1, ICDSMLA 2023, 2025, 1273 : 519 - 527
  • [44] ENHANCEMENT OF BLOWFISH ENCRYPTION IN TERMS OF SECURITY USING MIXED STRATEGY TECHNIQUE
    Raj, Joseph
    Ross, Shamina
    IIOAB JOURNAL, 2016, 7 (09) : 69 - 76
  • [45] Ciphertext only attack on QR code optical encryption system with spatially incoherent illumination using a neural network
    Rymov, D. A.
    Shifrina, A., V
    Cheremkhin, P. A.
    Ovchinnikov, A. S.
    Krasnov, V. V.
    Starikov, R. S.
    JOURNAL OF OPTICS, 2024, 26 (11)
  • [46] Social engineering solutions for document generation using key-logger security mechanism and QR code
    Tekawade, Nikhil
    Kshirsagar, Shruti
    Sukate, Shripad
    Raut, Leena
    Vairagar, Shubhangi
    2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [47] Privacy Protection and Security for Medical Images Using Homomorphic Encryption Based Reversible Data Hiding
    Liu, Jianyi
    Zhao, Kaifeng
    Zhang, Ru
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2019, 124 : 27 - 28
  • [48] A novel trust-based security and privacy model for Internet of Vehicles using encryption and steganography
    Rathore, Manjari Singh
    Poongodi, M.
    Saurabh, Praneet
    Lilhore, Umesh Kumar
    Bourouis, Sami
    Alhakami, Wajdi
    Osamor, Jude
    Hamdi, Mounir
    COMPUTERS & ELECTRICAL ENGINEERING, 2022, 102
  • [49] QR code-based non-linear image encryption using Shearlet transform and spiral phase transform
    Kumar, Ravi
    Bhaduri, Basanta
    Hennelly, Bryan
    JOURNAL OF MODERN OPTICS, 2018, 65 (03) : 321 - 330
  • [50] Blockchain-Based Federated Learning With Enhanced Privacy and Security Using Homomorphic Encryption and Reputation
    Yang, Ruizhe
    Zhao, Tonghui
    Yu, F. Richard
    Li, Meng
    Zhang, Dajun
    Zhao, Xuehui
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 21674 - 21688